Skip to main content

Cyberstrike is now open source! AI-powered penetration testing for security professionals. Star on GitHub

CLI Commands

Cyberstrike provides a powerful command line interface for security assessments. This reference covers all available commands, options, and usage patterns.

🎬 GIF: g02-model-switch.gif

İnteraktif model değiştirme demosu (10s)

📸 SCREENSHOT: s04-model-dialog.png

Model seçim dialogu

📊 DIAGRAM: command-hierarchy.mermaid

Komut hiyerarşi diyagramı

Command Structure

cyberstrike [global-options] <command> [command-options] [arguments]

Global Options

OptionAliasDescription
--help-hDisplay help information
--version-vShow version number
--print-logsPrint logs to stderr
--log-levelSet log level (DEBUG, INFO, WARN, ERROR)

Interactive Mode

Launch the terminal user interface without arguments:

Terminal window
cyberstrike

Interactive Mode Options

OptionAliasDescription
--model <model>-mModel in format provider/model
--agent <name>Security agent to use
--continue-cContinue last session
--session <id>-sResume specific session

Examples

Terminal window
# Start with specific model
cyberstrike --model anthropic/claude-sonnet-4-20250514
# Use web application agent
cyberstrike --agent web-application
# Continue previous session
cyberstrike --continue

run

Execute a single prompt without entering interactive mode.

Terminal window
cyberstrike run [message..] [options]

Options

OptionAliasDescription
--model <model>-mModel in format provider/model
--agent <name>Agent to use
--continue-cContinue last session
--session <id>-sResume specific session
--file <path>-fAttach file(s) to message
--format <type>Output format: default or json
--shareShare the session
--title <text>Set session title
--attach <url>Attach to running server
--variant <type>Model variant (high, max, minimal)

Examples

Terminal window
# Run single command
cyberstrike run "scan example.com for open ports"
# Attach file to request
cyberstrike run "analyze this config" -f nginx.conf
# Output as JSON
cyberstrike run "list vulnerabilities" --format json
# Continue previous session
cyberstrike run "now check for XSS" --continue

Piping Input

Accept input from stdin:

Terminal window
echo "analyze this code" | cyberstrike run
cat report.txt | cyberstrike run "summarize this"

auth

Manage authentication credentials for AI providers.

auth login

Add credentials for an AI provider:

Terminal window
cyberstrike auth login [url]

Interactive Login

Terminal window
cyberstrike auth login
# Select provider from list
# Enter API key when prompted

Well-Known URL Login

Terminal window
cyberstrike auth login https://custom-provider.example.com

auth logout

Remove stored credentials:

Terminal window
cyberstrike auth logout
# Select provider from list

auth list

Display all configured credentials:

Terminal window
cyberstrike auth list

Output shows:

  • Stored credentials by provider
  • Authentication type (api, oauth)
  • Active environment variables

mcp

Manage Model Context Protocol (MCP) servers.

mcp list

List configured MCP servers and their status:

Terminal window
cyberstrike mcp list

Status indicators:

  • ✓ Connected
  • â—‹ Not initialized / Disabled
  • âš  Needs authentication
  • ✗ Failed

mcp add

Add a new MCP server interactively:

Terminal window
cyberstrike mcp add

The wizard prompts for:

  1. Location (project or global)
  2. Server name
  3. Server type (local or remote)
  4. Connection details

Local Server Example

Terminal window
# After running `cyberstrike mcp add`:
# Location: Current project
# Name: filesystem
# Type: Local
# Command: npx @modelcontextprotocol/server-filesystem /path/to/dir

Remote Server Example

Terminal window
# After running `cyberstrike mcp add`:
# Location: Global
# Name: custom-api
# Type: Remote
# URL: https://api.example.com/mcp
# OAuth: Yes/No

mcp auth

Authenticate with an OAuth-enabled MCP server:

Terminal window
cyberstrike mcp auth [name]

mcp auth list

List OAuth status for all MCP servers:

Terminal window
cyberstrike mcp auth list

mcp logout

Remove OAuth credentials:

Terminal window
cyberstrike mcp logout [name]

mcp debug

Debug OAuth connection issues:

Terminal window
cyberstrike mcp debug <name>

session

Manage conversation sessions.

session list

List all sessions:

Terminal window
cyberstrike session list [options]
OptionAliasDescription
--max-count <n>-nLimit to N recent sessions
--format <type>Output: table or json

Examples

Terminal window
# List 10 most recent sessions
cyberstrike session list -n 10
# Export as JSON
cyberstrike session list --format json

models

List available AI models.

Terminal window
cyberstrike models

Displays all models organized by provider with:

  • Model identifier
  • Model name
  • Capabilities

agent

Manage security agents.

Terminal window
cyberstrike agent [name]

Listing Agents

Terminal window
cyberstrike agent
# Shows available agents

Agent Information

Terminal window
cyberstrike agent web-application
# Shows agent details and prompt

github

GitHub integration commands.

github pr

Create or review pull requests:

Terminal window
cyberstrike github pr [options]

github issue

Work with GitHub issues:

Terminal window
cyberstrike github issue [number]

pr

Quick pull request operations.

Terminal window
cyberstrike pr [options]

export

Export session data.

Terminal window
cyberstrike export <session-id> [options]
OptionDescription
--format <type>Export format
--output <path>Output file path

import

Import session data.

Terminal window
cyberstrike import <file> [options]

upgrade

Update Cyberstrike to the latest version.

Terminal window
cyberstrike upgrade

uninstall

Remove Cyberstrike from your system.

Terminal window
cyberstrike uninstall

serve

Start the Cyberstrike API server.

Terminal window
cyberstrike serve [options]
OptionDescription
--port <number>Server port
--host <address>Bind address

stats

Display usage statistics.

Terminal window
cyberstrike stats

Shows:

  • Token usage
  • Session counts
  • Cost estimates

completion

Generate shell completion scripts.

Terminal window
# Bash
cyberstrike completion >> ~/.bashrc
# Zsh
cyberstrike completion >> ~/.zshrc
# Fish
cyberstrike completion | source

Environment Variables

Configure Cyberstrike behavior through environment variables:

VariableDescription
CYBERSTRIKE_PROVIDERDefault AI provider
CYBERSTRIKE_MODELDefault model
CYBERSTRIKE_AGENTDefault agent
CYBERSTRIKE_AUTO_SHAREAuto-share sessions
ANTHROPIC_API_KEYAnthropic API key
OPENAI_API_KEYOpenAI API key
GOOGLE_API_KEYGoogle AI API key
OPENROUTER_API_KEYOpenRouter API key

Exit Codes

CodeMeaning
0Success
1General error
2Invalid arguments
130Interrupted (Ctrl+C)

Configuration Files

Cyberstrike reads configuration from these locations:

PathScope
./cyberstrike.jsonProject
./.cyberstrike/config.jsonProject
~/.cyberstrike/config.jsonGlobal

See Configuration Reference for schema details.